Resource overbooking and application profiling in a shared internet hosting platform

Bhuvan Urgaonkar, Prashant Shenoy, Timothy Roscoe

Research output: Contribution to journalArticle

36 Scopus citations

Abstract

In this article, we present techniques for provisioning CPU and network resources in shared Internet hosting platforms running potentially antagonistic third-party applications. The primary contribution of our work is to demonstrate the feasibility and benefits of overbooking resources in shared Internet platforms. Since an accurate estimate of an application's resource needs is necessary when overbooking resources, we present techniques to profile applications on dedicated nodes, possibly while in service, and use these profiles to guide the placement of application components onto shared nodes. We then propose techniques to overbook cluster resources in a controlled fashion. We outline an empirical appraoch to determine the degree of overbooking that allows a platform to achieve improvements in revenue while providing performance guarantees to Internet applications. We show how our techniques can be combined with commonly used QoS resource allocation mechanisms to provide application isolation and performance guarantees at run-time. We implement our techniques in a Linux cluster and evaluate them using common server applications. We find that the efficiency (and consequently revenue) benefits from controlled overbooking of resources can be dramatic. Specifically, we find that overbooking resources by as little as 1% we can increase the utilization of the cluster by a factor of two, and a 5% overbooking yields a 300 - 500% improvement, while still providing useful resource guarantees to applications.

Original languageEnglish (US)
Article number1
JournalACM Transactions on Internet Technology
Volume9
Issue number1
DOIs
StatePublished - Feb 1 2009

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Resource overbooking and application profiling in a shared internet hosting platform'. Together they form a unique fingerprint.

  • Cite this